Analysis Overview
SHA256
8de9c9beb6f09e75660d9bdfe5fde9935ec30c8eef91ff521a71b02bb16efaeb
Threat Level: Known bad
The file b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics was found to be: Known bad.
Malicious Activity Summary
Modifies visiblity of hidden/system files in Explorer
Executes dropped EXE
Loads dropped DLL
Checks computer location settings
Adds Run key to start application
Unsigned PE
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-05-13 10:36
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-13 10:36
Reported
2024-05-13 10:39
Platform
win7-20240221-en
Max time kernel
132s
Max time network
121s
Command Line
Signatures
Modifies visiblity of hidden/system files in Explorer
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" | C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" | C:\Users\Admin\neuet.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\neuet.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /s" | C:\Users\Admin\neuet.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /h" | C:\Users\Admin\neuet.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /a" | C:\Users\Admin\neuet.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /v" | C:\Users\Admin\neuet.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /e" | C:\Users\Admin\neuet.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /a" | C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /d" | C:\Users\Admin\neuet.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /z" | C:\Users\Admin\neuet.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /f" | C:\Users\Admin\neuet.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /y" | C:\Users\Admin\neuet.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /l" | C:\Users\Admin\neuet.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /b" | C:\Users\Admin\neuet.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /m" | C:\Users\Admin\neuet.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /w" | C:\Users\Admin\neuet.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /c" | C:\Users\Admin\neuet.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /x" | C:\Users\Admin\neuet.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /k" | C:\Users\Admin\neuet.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /t" | C:\Users\Admin\neuet.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /p" | C:\Users\Admin\neuet.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /g" | C:\Users\Admin\neuet.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /r" | C:\Users\Admin\neuet.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /o" | C:\Users\Admin\neuet.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /i" | C:\Users\Admin\neuet.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /u" | C:\Users\Admin\neuet.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /n" | C:\Users\Admin\neuet.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /j" | C:\Users\Admin\neuet.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /q" | C:\Users\Admin\neuet.exe | N/A |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe | N/A |
| N/A | N/A | C:\Users\Admin\neuet.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1664 wrote to memory of 2688 | N/A | C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe | C:\Users\Admin\neuet.exe |
| PID 1664 wrote to memory of 2688 | N/A | C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe | C:\Users\Admin\neuet.exe |
| PID 1664 wrote to memory of 2688 | N/A | C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe | C:\Users\Admin\neuet.exe |
| PID 1664 wrote to memory of 2688 | N/A | C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe | C:\Users\Admin\neuet.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe"
C:\Users\Admin\neuet.exe
"C:\Users\Admin\neuet.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | ns1.chopstickers.com | udp |
| US | 54.209.32.212:8000 | ns1.chopstickers.com | tcp |
Files
\Users\Admin\neuet.exe
| MD5 | 52a339d766167f60aee784d8c700a4f9 |
| SHA1 | e654e3cd304de7cbc9c7236447fd1199d70b8cd8 |
| SHA256 | e130e0c21559ca193aea0f697b56555c82774d947095fdb6e2e3de4f4f1f6198 |
| SHA512 | e71e0434131fc0e1f6b8666df313e24f5911c1e6caece6ae61ed3739f2ac1ff1322aa20f52fa796c59622361355f0b9398160f1e92655ccf997d9a16186a554d |
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-13 10:36
Reported
2024-05-13 10:39
Platform
win10v2004-20240508-en
Max time kernel
110s
Max time network
150s
Command Line
Signatures
Modifies visiblity of hidden/system files in Explorer
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" | C:\Users\Admin\kiuroi.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" | C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\kiuroi.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /e" | C:\Users\Admin\kiuroi.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /i" | C:\Users\Admin\kiuroi.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /s" | C:\Users\Admin\kiuroi.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /d" | C:\Users\Admin\kiuroi.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /x" | C:\Users\Admin\kiuroi.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /r" | C:\Users\Admin\kiuroi.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /v" | C:\Users\Admin\kiuroi.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /f" | C:\Users\Admin\kiuroi.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /j" | C:\Users\Admin\kiuroi.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /k" | C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /p" | C:\Users\Admin\kiuroi.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /o" | C:\Users\Admin\kiuroi.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /t" | C:\Users\Admin\kiuroi.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /z" | C:\Users\Admin\kiuroi.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /h" | C:\Users\Admin\kiuroi.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /l" | C:\Users\Admin\kiuroi.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /g" | C:\Users\Admin\kiuroi.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /q" | C:\Users\Admin\kiuroi.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /w" | C:\Users\Admin\kiuroi.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /k" | C:\Users\Admin\kiuroi.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /y" | C:\Users\Admin\kiuroi.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /b" | C:\Users\Admin\kiuroi.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /u" | C:\Users\Admin\kiuroi.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /n" | C:\Users\Admin\kiuroi.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /m" | C:\Users\Admin\kiuroi.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /c" | C:\Users\Admin\kiuroi.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /a" | C:\Users\Admin\kiuroi.exe | N/A |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe | N/A |
| N/A | N/A | C:\Users\Admin\kiuroi.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1808 wrote to memory of 5008 | N/A | C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe | C:\Users\Admin\kiuroi.exe |
| PID 1808 wrote to memory of 5008 | N/A | C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe | C:\Users\Admin\kiuroi.exe |
| PID 1808 wrote to memory of 5008 | N/A | C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe | C:\Users\Admin\kiuroi.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe"
C:\Users\Admin\kiuroi.exe
"C:\Users\Admin\kiuroi.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 72.32.126.40.in-addr.arpa | udp |
| NL | 23.62.61.72:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 205.47.74.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 72.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | ns1.chopstickers.com | udp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 77.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 98.56.20.217.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 22.236.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 4.173.189.20.in-addr.arpa | udp |
Files
C:\Users\Admin\kiuroi.exe
| MD5 | 0d1caa8586ebb92b7a225a864938a085 |
| SHA1 | 13c4df44425cfda0b6b7372d0852f0d881ae332f |
| SHA256 | 5c9c4a5d41b2e28220cf1b2318138925a13e4473543344b2a073760fdefd093f |
| SHA512 | d3b8e9f05d637fc4ef7a4357cc94974e9c2919c845c5a0f4b5c50fd6aeb9e892f7eec732f6e4e2e5e83b68e638d9d1843bada39f82f8bff6494459aa51f4db9d |